Blockchain-Based Decentralized Authentication Modeling Scheme in Edge and IoT Environment

Authentication is the first entrance to kinds of information systems; however, traditional centered single-side authentication is weak and fragile, which has security risk of single-side failure or breakdown caused by outside attacks or internal cheating. In the edge and Internet-of-Things (IoT) env...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE internet of things journal 2021-02, Vol.8 (4), p.2116-2123
Hauptverfasser: Zhaofeng, Ma, Jialin, Meng, Jihui, Wang, Zhiguang, Shan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2123
container_issue 4
container_start_page 2116
container_title IEEE internet of things journal
container_volume 8
creator Zhaofeng, Ma
Jialin, Meng
Jihui, Wang
Zhiguang, Shan
description Authentication is the first entrance to kinds of information systems; however, traditional centered single-side authentication is weak and fragile, which has security risk of single-side failure or breakdown caused by outside attacks or internal cheating. In the edge and Internet-of-Things (IoT) environment, blockchain can apply edge devices to better serve the IoT and provide decentralized high security service solutions. In this article, we proposed a blockchain-based decentralized authentication modeling scheme (named BlockAuth) in edge and IoT environment to provide a more secure, reliable, and strong fault tolerance novel solution, in which each edge device is regarded as a node to form a blockchain network. We designed secure registration and authentication strategy, blockchain-based decentralized authentication protocol, and developed the blockchain consensus, smart contract, and implemented a whole blockchain-based authentication platform for the feasibility, security, and performance evaluation. The analysis and evaluation show that the proposed BlockAuth scheme provides a more secure, reliable, and strong fault tolerance decentralized novel authentication with high-level security driven configuration management. The proposed BlockAuth scheme is suitable for password-based, certificate-based, biotechnology-based, and token-based authentication for high-level security requirement system in edge and IoT environment.
doi_str_mv 10.1109/JIOT.2020.3037733
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JIOT_2020_3037733</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9257454</ieee_id><sourcerecordid>2487438084</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-de09c14aaaa85d78a9ba5c56382ba5d8554291a65036c4de815bed84f698ab343</originalsourceid><addsrcrecordid>eNpNkM1OAjEUhRujiQR5AOOmievB_s60S0BUDIaFuHDVlLZAEVrsDCb69HYCMd7NPSc5597kA-Aaoz7GSN49T2bzPkEE9SmiVUXpGegQSqqClSU5_6cvQa-uNwihXONYlh3wPtxG82HW2odiqGtn4b0zLjRJb_1PdoNDs87WG934GOBLtG7rwwq-mrXbOegDHNuVgzpYOIlzOA5fPsWwy5UrcLHU29r1TrsL3h7G89FTMZ09TkaDaWGIpE1hHZIGM51HcFsJLReaG15SQbKwgnNGJNYlR7Q0zDqB-cJZwZalFHpBGe2C2-PdfYqfB1c3ahMPKeSXijBRMSqQaFP4mDIp1nVyS7VPfqfTt8JItRBVC1G1ENUJYu7cHDveOfeXl4RXjDP6Czu_bSY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2487438084</pqid></control><display><type>article</type><title>Blockchain-Based Decentralized Authentication Modeling Scheme in Edge and IoT Environment</title><source>IEEE Electronic Library (IEL)</source><creator>Zhaofeng, Ma ; Jialin, Meng ; Jihui, Wang ; Zhiguang, Shan</creator><creatorcontrib>Zhaofeng, Ma ; Jialin, Meng ; Jihui, Wang ; Zhiguang, Shan</creatorcontrib><description>Authentication is the first entrance to kinds of information systems; however, traditional centered single-side authentication is weak and fragile, which has security risk of single-side failure or breakdown caused by outside attacks or internal cheating. In the edge and Internet-of-Things (IoT) environment, blockchain can apply edge devices to better serve the IoT and provide decentralized high security service solutions. In this article, we proposed a blockchain-based decentralized authentication modeling scheme (named BlockAuth) in edge and IoT environment to provide a more secure, reliable, and strong fault tolerance novel solution, in which each edge device is regarded as a node to form a blockchain network. We designed secure registration and authentication strategy, blockchain-based decentralized authentication protocol, and developed the blockchain consensus, smart contract, and implemented a whole blockchain-based authentication platform for the feasibility, security, and performance evaluation. The analysis and evaluation show that the proposed BlockAuth scheme provides a more secure, reliable, and strong fault tolerance decentralized novel authentication with high-level security driven configuration management. The proposed BlockAuth scheme is suitable for password-based, certificate-based, biotechnology-based, and token-based authentication for high-level security requirement system in edge and IoT environment.</description><identifier>ISSN: 2327-4662</identifier><identifier>EISSN: 2327-4662</identifier><identifier>DOI: 10.1109/JIOT.2020.3037733</identifier><identifier>CODEN: IITJAU</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Authentication ; Blockchain ; Configuration management ; Cryptography ; decentralized authentication modeling ; edge computing ; Face recognition ; Fault tolerance ; Fingerprint recognition ; Information systems ; Internet of Things ; Internet of Things (IoT) ; Performance evaluation ; Public key ; Security ; Security services</subject><ispartof>IEEE internet of things journal, 2021-02, Vol.8 (4), p.2116-2123</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-de09c14aaaa85d78a9ba5c56382ba5d8554291a65036c4de815bed84f698ab343</citedby><cites>FETCH-LOGICAL-c293t-de09c14aaaa85d78a9ba5c56382ba5d8554291a65036c4de815bed84f698ab343</cites><orcidid>0000-0001-7875-4169</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9257454$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9257454$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zhaofeng, Ma</creatorcontrib><creatorcontrib>Jialin, Meng</creatorcontrib><creatorcontrib>Jihui, Wang</creatorcontrib><creatorcontrib>Zhiguang, Shan</creatorcontrib><title>Blockchain-Based Decentralized Authentication Modeling Scheme in Edge and IoT Environment</title><title>IEEE internet of things journal</title><addtitle>JIoT</addtitle><description>Authentication is the first entrance to kinds of information systems; however, traditional centered single-side authentication is weak and fragile, which has security risk of single-side failure or breakdown caused by outside attacks or internal cheating. In the edge and Internet-of-Things (IoT) environment, blockchain can apply edge devices to better serve the IoT and provide decentralized high security service solutions. In this article, we proposed a blockchain-based decentralized authentication modeling scheme (named BlockAuth) in edge and IoT environment to provide a more secure, reliable, and strong fault tolerance novel solution, in which each edge device is regarded as a node to form a blockchain network. We designed secure registration and authentication strategy, blockchain-based decentralized authentication protocol, and developed the blockchain consensus, smart contract, and implemented a whole blockchain-based authentication platform for the feasibility, security, and performance evaluation. The analysis and evaluation show that the proposed BlockAuth scheme provides a more secure, reliable, and strong fault tolerance decentralized novel authentication with high-level security driven configuration management. The proposed BlockAuth scheme is suitable for password-based, certificate-based, biotechnology-based, and token-based authentication for high-level security requirement system in edge and IoT environment.</description><subject>Authentication</subject><subject>Blockchain</subject><subject>Configuration management</subject><subject>Cryptography</subject><subject>decentralized authentication modeling</subject><subject>edge computing</subject><subject>Face recognition</subject><subject>Fault tolerance</subject><subject>Fingerprint recognition</subject><subject>Information systems</subject><subject>Internet of Things</subject><subject>Internet of Things (IoT)</subject><subject>Performance evaluation</subject><subject>Public key</subject><subject>Security</subject><subject>Security services</subject><issn>2327-4662</issn><issn>2327-4662</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkM1OAjEUhRujiQR5AOOmievB_s60S0BUDIaFuHDVlLZAEVrsDCb69HYCMd7NPSc5597kA-Aaoz7GSN49T2bzPkEE9SmiVUXpGegQSqqClSU5_6cvQa-uNwihXONYlh3wPtxG82HW2odiqGtn4b0zLjRJb_1PdoNDs87WG934GOBLtG7rwwq-mrXbOegDHNuVgzpYOIlzOA5fPsWwy5UrcLHU29r1TrsL3h7G89FTMZ09TkaDaWGIpE1hHZIGM51HcFsJLReaG15SQbKwgnNGJNYlR7Q0zDqB-cJZwZalFHpBGe2C2-PdfYqfB1c3ahMPKeSXijBRMSqQaFP4mDIp1nVyS7VPfqfTt8JItRBVC1G1ENUJYu7cHDveOfeXl4RXjDP6Czu_bSY</recordid><startdate>20210215</startdate><enddate>20210215</enddate><creator>Zhaofeng, Ma</creator><creator>Jialin, Meng</creator><creator>Jihui, Wang</creator><creator>Zhiguang, Shan</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-7875-4169</orcidid></search><sort><creationdate>20210215</creationdate><title>Blockchain-Based Decentralized Authentication Modeling Scheme in Edge and IoT Environment</title><author>Zhaofeng, Ma ; Jialin, Meng ; Jihui, Wang ; Zhiguang, Shan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-de09c14aaaa85d78a9ba5c56382ba5d8554291a65036c4de815bed84f698ab343</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Authentication</topic><topic>Blockchain</topic><topic>Configuration management</topic><topic>Cryptography</topic><topic>decentralized authentication modeling</topic><topic>edge computing</topic><topic>Face recognition</topic><topic>Fault tolerance</topic><topic>Fingerprint recognition</topic><topic>Information systems</topic><topic>Internet of Things</topic><topic>Internet of Things (IoT)</topic><topic>Performance evaluation</topic><topic>Public key</topic><topic>Security</topic><topic>Security services</topic><toplevel>online_resources</toplevel><creatorcontrib>Zhaofeng, Ma</creatorcontrib><creatorcontrib>Jialin, Meng</creatorcontrib><creatorcontrib>Jihui, Wang</creatorcontrib><creatorcontrib>Zhiguang, Shan</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE internet of things journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zhaofeng, Ma</au><au>Jialin, Meng</au><au>Jihui, Wang</au><au>Zhiguang, Shan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Blockchain-Based Decentralized Authentication Modeling Scheme in Edge and IoT Environment</atitle><jtitle>IEEE internet of things journal</jtitle><stitle>JIoT</stitle><date>2021-02-15</date><risdate>2021</risdate><volume>8</volume><issue>4</issue><spage>2116</spage><epage>2123</epage><pages>2116-2123</pages><issn>2327-4662</issn><eissn>2327-4662</eissn><coden>IITJAU</coden><abstract>Authentication is the first entrance to kinds of information systems; however, traditional centered single-side authentication is weak and fragile, which has security risk of single-side failure or breakdown caused by outside attacks or internal cheating. In the edge and Internet-of-Things (IoT) environment, blockchain can apply edge devices to better serve the IoT and provide decentralized high security service solutions. In this article, we proposed a blockchain-based decentralized authentication modeling scheme (named BlockAuth) in edge and IoT environment to provide a more secure, reliable, and strong fault tolerance novel solution, in which each edge device is regarded as a node to form a blockchain network. We designed secure registration and authentication strategy, blockchain-based decentralized authentication protocol, and developed the blockchain consensus, smart contract, and implemented a whole blockchain-based authentication platform for the feasibility, security, and performance evaluation. The analysis and evaluation show that the proposed BlockAuth scheme provides a more secure, reliable, and strong fault tolerance decentralized novel authentication with high-level security driven configuration management. The proposed BlockAuth scheme is suitable for password-based, certificate-based, biotechnology-based, and token-based authentication for high-level security requirement system in edge and IoT environment.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/JIOT.2020.3037733</doi><tpages>8</tpages><orcidid>https://orcid.org/0000-0001-7875-4169</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2327-4662
ispartof IEEE internet of things journal, 2021-02, Vol.8 (4), p.2116-2123
issn 2327-4662
2327-4662
language eng
recordid cdi_crossref_primary_10_1109_JIOT_2020_3037733
source IEEE Electronic Library (IEL)
subjects Authentication
Blockchain
Configuration management
Cryptography
decentralized authentication modeling
edge computing
Face recognition
Fault tolerance
Fingerprint recognition
Information systems
Internet of Things
Internet of Things (IoT)
Performance evaluation
Public key
Security
Security services
title Blockchain-Based Decentralized Authentication Modeling Scheme in Edge and IoT Environment
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T18%3A38%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Blockchain-Based%20Decentralized%20Authentication%20Modeling%20Scheme%20in%20Edge%20and%20IoT%20Environment&rft.jtitle=IEEE%20internet%20of%20things%20journal&rft.au=Zhaofeng,%20Ma&rft.date=2021-02-15&rft.volume=8&rft.issue=4&rft.spage=2116&rft.epage=2123&rft.pages=2116-2123&rft.issn=2327-4662&rft.eissn=2327-4662&rft.coden=IITJAU&rft_id=info:doi/10.1109/JIOT.2020.3037733&rft_dat=%3Cproquest_RIE%3E2487438084%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2487438084&rft_id=info:pmid/&rft_ieee_id=9257454&rfr_iscdi=true